47,325 research outputs found

    Modelling of a Gas Cap Gas Lift System

    Get PDF
    Imperial Users onl

    Determinants of firm-size

    Get PDF
    Overzicht van theoretische factoren die belangrijk zijn bij het verklaren van schaalgrootte van bedrijven en verschillen in schaalgrootte tussen vergelijkbare bedrijven. Naast de theoretische factoren worden enkele relevante trends beschreven en wordt gekeken naar de impact van deze trends op de mechanismen die schaalgrootte beïnvloeden. Terwijl het aantal overnames en fusies de laatste jaren sterk is toegenomen, is ook het aantal startende bedrijven sterk gegroeid. Per saldo is het gemiddelde bedrijf in Nederland licht in omvang afgenomen. De mechanismen die schaalgrootte en verdeling van schaalgrootte beïnvloeden, zijn bekeken op het niveau van de bedrijven zelf en op het niveau van sectoren. Bij het bedrijfsniveau gaat het bijvoorbeeld om schaal- en scopevoordelen, transactiekosten, ?agency-costs? en de levenscyclus van bedrijven. Mechanismen die belangrijk zijn op het niveau van sectoren of clusters zijn bijvoorbeeld externe schaal- en scope-effecten en netwerkeffecten. Overigens is er veel overlap tussen al deze mechanismen. Trends die belangrijk zijn voor schaalgrootte zijn met name globalisering, technologische ontwikkeling en deregulering.

    Managing Research Data in Big Science

    Get PDF
    The project which led to this report was funded by JISC in 2010--2011 as part of its 'Managing Research Data' programme, to examine the way in which Big Science data is managed, and produce any recommendations which may be appropriate. Big science data is different: it comes in large volumes, and it is shared and exploited in ways which may differ from other disciplines. This project has explored these differences using as a case-study Gravitational Wave data generated by the LSC, and has produced recommendations intended to be useful variously to JISC, the funding council (STFC) and the LSC community. In Sect. 1 we define what we mean by 'big science', describe the overall data culture there, laying stress on how it necessarily or contingently differs from other disciplines. In Sect. 2 we discuss the benefits of a formal data-preservation strategy, and the cases for open data and for well-preserved data that follow from that. This leads to our recommendations that, in essence, funders should adopt rather light-touch prescriptions regarding data preservation planning: normal data management practice, in the areas under study, corresponds to notably good practice in most other areas, so that the only change we suggest is to make this planning more formal, which makes it more easily auditable, and more amenable to constructive criticism. In Sect. 3 we briefly discuss the LIGO data management plan, and pull together whatever information is available on the estimation of digital preservation costs. The report is informed, throughout, by the OAIS reference model for an open archive

    Practice activity trends among oral and maxillofacial surgeons in Australia

    Get PDF
    © 2004 Brennan et al; licensee BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.BACKGROUND: The aim of this study was to describe practice activity trends among oral and maxillofacial surgeons in Australia over time. METHODS: All registered oral and maxillofacial surgeons in Australia were surveyed in 1990 and 2000 using mailed self-complete questionnaires. RESULTS: Data were available from 79 surgeons from 1990 (response rate = 73.8%) and 116 surgeons from 2000 (response rate = 65.1%). The rate of provision of services per visit changed over time with increased rates observed overall (from 1.43 ± 0.05 services per visit in 1990 to 1.66 ± 0.06 services per visit in 2000), reflecting increases in pathology and reconstructive surgery. No change over time was observed in the provision of services per year (4,521 ± 286 services per year in 1990 and 4,503 ± 367 services per year in 2000). Time devoted to work showed no significant change over time (1,682 ± 75 hours per year in 1990 and 1,681 ± 94 hours per year in 2000), while the number of visits per week declined (70 ± 4 visits per week in 1990 to 58 ± 4 visits per week in 2000). CONCLUSIONS: The apparent stability in the volume of services provided per year reflected a counterbalancing of increased services provided per visit and a decrease in the number of visits supplied.David S Brennan, A John Spencer, Kiran A Singh, Dana N Teusner and Alastair N Gos

    Managing Research Data: Gravitational Waves

    Get PDF
    The project which led to this report was funded by JISC in 2010–2011 as part of its ‘Managing Research Data’ programme, to examine the way in which Big Science data is managed, and produce any recommendations which may be appropriate. Big science data is different: it comes in large volumes, and it is shared and exploited in ways which may differ from other disciplines. This project has explored these differences using as a case-study Gravitational Wave data generated by the LSC, and has produced recommendations intended to be useful variously to JISC, the funding council (STFC) and the LSC community. In Sect. 1 we define what we mean by ‘big science’, describe the overall data culture there, laying stress on how it necessarily or contingently differs from other disciplines. In Sect. 2 we discuss the benefits of a formal data-preservation strategy, and the cases for open data and for well-preserved data that follow from that. This leads to our recommendations that, in essence, funders should adopt rather light-touch prescriptions regarding data preservation planning: normal data management practice, in the areas under study, corresponds to notably good practice in most other areas, so that the only change we suggest is to make this planning more formal, which makes it more easily auditable, and more amenable to constructive criticism. In Sect. 3 we briefly discuss the LIGO data management plan, and pull together whatever information is available on the estimation of digital preservation costs. The report is informed, throughout, by the OAIS reference model for an open archive. Some of the report’s findings and conclusions were summarised in [1]. See the document history on page 37

    Focal Spot, Fall/Winter 1996

    Get PDF
    https://digitalcommons.wustl.edu/focal_spot_archives/1071/thumbnail.jp

    Spam

    Get PDF
    With the advent of the electronic mail system in the 1970s, a new opportunity for direct marketing using unsolicited electronic mail became apparent. In 1978, Gary Thuerk compiled a list of those on the Arpanet and then sent out a huge mailing publicising Digital Equipment Corporation (DEC—now Compaq) systems. The reaction from the Defense Communications Agency (DCA), who ran Arpanet, was very negative, and it was this negative reaction that ensured that it was a long time before unsolicited e-mail was used again (Templeton, 2003). As long as the U.S. government controlled a major part of the backbone, most forms of commercial activity were forbidden (Hayes, 2003). However, in 1993, the Internet Network Information Center was privatized, and with no central government controls, spam, as it is now called, came into wider use. The term spam was taken from the Monty Python Flying Circus (a UK comedy group) and their comedy skit that featured the ironic spam song sung in praise of spam (luncheon meat)—“spam, spam, spam, lovely spam”—and it came to mean mail that was unsolicited. Conversely, the term ham came to mean e-mail that was wanted. Brad Templeton, a UseNet pioneer and chair of the Electronic Frontier Foundation, has traced the first usage of the term spam back to MUDs (Multi User Dungeons), or real-time multi-person shared environment, and the MUD community. These groups introduced the term spam to the early chat rooms (Internet Relay Chats). The first major UseNet (the world’s largest online conferencing system) spam sent in January 1994 and was a religious posting: “Global alert for all: Jesus is coming soon.” The term spam was more broadly popularised in April 1994, when two lawyers, Canter and Siegel from Arizona, posted a message that advertized their information and legal services for immigrants applying for the U.S. Green Card scheme. The message was posted to every newsgroup on UseNet, and after this incident, the term spam became synonymous with junk or unsolicited e-mail. Spam spread quickly among the UseNet groups who were easy targets for spammers simply because the e-mail addresses of members were widely available (Templeton, 2003)

    Intellectual Property Law Enforcement in China: Trade Issues, Policies and Practices

    Get PDF
    corecore